CN111835551A - Method and apparatus for operating a network element and a monitoring entity in a communication infrastructure - Google Patents

Method and apparatus for operating a network element and a monitoring entity in a communication infrastructure Download PDF

Info

Publication number
CN111835551A
CN111835551A CN202010293773.9A CN202010293773A CN111835551A CN 111835551 A CN111835551 A CN 111835551A CN 202010293773 A CN202010293773 A CN 202010293773A CN 111835551 A CN111835551 A CN 111835551A
Authority
CN
China
Prior art keywords
policy
message
monitoring entity
communication infrastructure
network component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010293773.9A
Other languages
Chinese (zh)
Other versions
CN111835551B (en
Inventor
M.E.德林
R.纪尧姆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Publication of CN111835551A publication Critical patent/CN111835551A/en
Application granted granted Critical
Publication of CN111835551B publication Critical patent/CN111835551B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/028Dynamic adaptation of the update intervals, e.g. event-triggered updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/16Multipoint routing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a method and apparatus for operating a network element and a monitoring entity in a communication infrastructure. In a method for a network component and a monitoring entity operating in a software-defined networked communication infrastructure, the software-defined networked communication infrastructure is switched from operating according to a first policy to operating according to a second policy as a function of at least one trigger signal, wherein in operation according to the first policy at least one trigger signal is received from the monitoring entity, wherein in a check it is checked by the network component that: whether a second policy is enforced or is enforceable; and wherein the monitoring entity verifies that: whether to obtain a reply message from at least one of the plurality of network components in response to the sending of the trigger device message; and wherein the abort message is sent by the monitoring entity when the second policy is not enforceable by the network element or when no information is obtained as to whether the second policy is enforceable up to a predefined point in time.

Description

Method and apparatus for operating a network element and a monitoring entity in a communication infrastructure
Technical Field
The invention relates to a method and a device for a network element and a monitoring entity (Kontrollinstanz) operating in a Software-Defined Networking (Software-Defined Networking) communication infrastructure.
Background
For such a communication infrastructure, it is desirable to take countermeasures which at least partially guarantee the data transmission in the event of interference or connection failure.
Disclosure of Invention
This is achieved by the subject matter of the independent claims.
A method for a network element operating in a software defined networked communication infrastructure provides for: the software-defined networked communication infrastructure is transitioned from operating according to a first policy to operating according to a second policy based on at least one trigger signal: the first policy is for forwarding time critical data flows in a network component of a communication infrastructure, the second policy is for forwarding time critical data flows in a network component; wherein, in operation according to the first policy, the at least one trigger signal is received from the monitoring entity in a Multicast (Multicast) message or a Unicast (Unicast) message or in a Broadcast (Broadcast) message; wherein in the checking it is checked by the network component: whether a second policy is enforceable; wherein, depending on the result of the check, the network component sends a reply message to the monitoring entity in response to the trigger device message, the reply message comprising information on whether the second policy is enforced or whether the second policy is enforceable. In this way, a consistent changeover between the two operating modes can be achieved.
Advantageously, a switch from operating according to the first strategy to operating according to the second strategy is made when no abort message is received up to a predefined switching time after the trigger message is received. Thus, a transition is caused in a network element as long as no further network element has caused the sending of the abort message.
Advantageously, it is provided that, after the reception of the trigger message, up to a predefined switching time point, the following is checked: whether an abort message is received; wherein operation according to the first policy is maintained when an abort message has been received up to a predefined changeover time point, and wherein an acknowledgement message is sent to the monitoring entity in response to the abort message. Operation according to the first strategy is maintained therein to: when the respective further network component is not switched to operation according to the second policy, switching of the respective network component, which may do so, to operation according to the second policy is avoided. Validation enables an understanding of the conversion process (nachzuvollziehen).
Advantageously, provision is made for a configuration confirmation message to be sent to the monitoring entity after the transition to operation according to the second policy. Configuration validation enables an understanding of the conversion.
It is advantageously provided that the trigger signal is represented by a heartbeat signal received by the network component, in particular periodically or cyclically, wherein the changeover from operation according to the first strategy to operation according to the second strategy is triggered in the absence of the heartbeat signal or in the event of a change in the heartbeat signal. This enables triggering of the transition by the network element. For example, a single switch may take the following countermeasures if a connection failure is identified: the countermeasures at least partially ensure the data transmission.
The method for a monitoring entity operating in a software defined networked communication infrastructure provides for: the software-defined networked communication infrastructure is transitioned from operating according to a first policy to operating according to a second policy based on at least one trigger signal: the first policy is for forwarding time critical data flows in a network component of a communication infrastructure, the second policy is for forwarding time critical data flows in a network component; wherein the at least one trigger signal is determined by the monitoring entity in operation according to the first policy and is transmitted to the plurality of network components, in particular in a plurality of unicast messages or in a broadcast message; wherein the monitoring entity verifies: whether a reply message is obtained from at least one of the plurality of network components in response to the sending of the trigger device message, the reply message including information as to whether the second policy is enforceable; and wherein the abort message is transmitted by the monitoring entity, in particular in a plurality of unicast messages or in a broadcast message, when the second policy is not enforceable by at least one of the plurality of network components or when no information about whether the second policy is enforceable is obtained from the at least one of the plurality of network components until a predefined point in time after the trigger message is transmitted. The monitoring entity may be a central monitoring entity or one of the network elements. For example, a single switch may act as a monitoring entity in case of identifying a connection failure and take the following countermeasures: the countermeasures at least partially ensure the data transmission.
It is advantageously provided that, until a predetermined confirmation point in time after the trigger message is sent, it is checked whether a configuration confirmation message has been received from the at least one network element, which configuration confirmation message confirms that: the network component switches from operating according to the first policy to operating according to the second policy, and wherein the abort message is transmitted, in particular in a plurality of unicast messages or in a broadcast message, when the second policy is not enforced by at least one of the plurality of network components or when no information is obtained from the at least one of the plurality of network components as to whether the second policy is enforced until an acknowledgement time point. Thereby, transitions are avoided when not all participating network components can enforce said second policy.
It is advantageously provided that it is checked whether a response message is obtained from all network elements of the plurality of network elements, which response message acknowledges that the second policy is implemented, wherein the abort message is sent if at least the second policy is not implemented by at least one of the plurality of network elements or if no information is obtained from at least one of the plurality of network elements as to whether the second policy is implemented until a predefined acknowledgement time after the trigger message is sent. Thus, the transition is interrupted when not all participating network components have enforced the second policy.
It is advantageously provided that the trigger signal is represented by a heartbeat signal which is transmitted by the monitoring entity, in particular periodically or periodically, wherein the transition from the operation according to the first strategy to the operation according to the second strategy is triggered by the absence of the heartbeat signal or by a change in the heartbeat signal. This is a particularly efficient signalling.
A network component in a software defined networked communication infrastructure includes a processor, a memory, and an interface to the communication infrastructure and is configured to implement a method for operating the network component.
The monitoring entity in the software defined networked communication infrastructure comprises a processor, a memory and an interface to the communication infrastructure and is configured to implement a method for operating the monitoring entity.
Drawings
Further advantageous embodiments can be gathered from the following description and the drawings. In the drawings:
figure 1 shows a schematic view of part of a communication infrastructure,
figure 2 shows steps in a network element according to a first method for operating a communication infrastructure,
figure 3 shows the steps in a monitoring entity according to a first method for operating a communication infrastructure,
figure 4 shows steps in a network element according to a second method for operating a communication infrastructure,
fig. 5 shows steps in a monitoring entity according to a second method for operating a communication infrastructure.
Detailed Description
Fig. 1 shows a portion of a communication infrastructure 100. The communication infrastructure 100 comprises a monitoring entity 102 and a plurality of network components 104.
The monitoring entity 102 comprises a Software Defined networking controller (Software Defined networking controller) as a logically centralized entity of the communication infrastructure 100. The software defined networked controller is connected to the network component 104 of the communication infrastructure 100 via a logical connection.
The communication infrastructure 100 is configured, for example, according to IEEE 802.3 as Ethernet (Ethernet). In this case, the network component 104 is configured, for example, as an ethernet switch. The communication infrastructure 100 can also be designed as a controller Area network can (controller Area network) according to ISO 11898. Instead of an Ethernet Switch (Ethernet Switch), in this case, for example, a Forwarding Device (Forwarding Device) is provided, which communicates according to the CAN protocol and which CAN assume the functions described for the Switch. Switches and forwarding devices are examples of network elements 104 that may be employed in order to operate communication infrastructure 100. The network components 104 each include a processor 106 in this example and each include a memory 108 and an interface 110 to the communication infrastructure 100. The processor 106 and the Memory 108 may be implemented as a microprocessor, as at least one application specific integrated circuit ASIC, as at least one field Programmable Gate array (fpga), or using at least one Ternary Content-Addressable Memory TCAM (Ternary Content-Addressable Memory).
The monitoring entity 102 in this example comprises an interface 112 to the communication infrastructure 100, a processor 114 and a memory 116. The latter may be implemented as a microprocessor, as at least one application specific integrated circuit ASIC, as at least one field programmable gate array FPGA, or with at least one ternary content addressable memory TCAM.
Instructions are stored in the memory which, when executed by the processor, perform the corresponding methods described below.
According to a first method, the software defined networked communication infrastructure 100 transitions from operating according to a first policy to operating according to a second policy in accordance with at least one trigger signal: the first policy is for forwarding time critical data flows in the network element 104 of the communication infrastructure 100 and the second policy is for forwarding time critical data flows in the network element.
Fig. 2 shows steps in the network component 104 according to a first method for operating the communication infrastructure 100.
In step 202, a trigger signal is awaited. When a trigger signal is received, step 204 is implemented. Optionally, a time measurement is started, which measures the time elapsed since the trigger signal was received. In operation according to the first policy, a trigger signal is received from the monitoring entity 102 in a multicast message, a unicast message, or in a broadcast message.
In step 204 it is checked in a check by the network component 104 whether the second policy is enforceable.
When the second policy is applicable, step 206 is implemented. Otherwise, step 208 is performed.
In step 206, a reply message is sent by the network component 104 to the monitoring entity 102 in response to the trigger message, depending on the result of the check, the reply message comprising information that the second policy is enforceable.
Next, step 210 is performed.
In step 208, a reply message is sent by the network component 104 to the monitoring entity 102 in response to the trigger message, depending on the result of the check, the reply message comprising information that the second policy is not practicable.
Next, step 202 is performed.
In step 210, a wait is made with the aid of this to a predefined switchover time point after the reception of the trigger message. Time measurements are used for this purpose.
Step 212 is carried out when a predefined switchover time point after the reception of the trigger message is reached.
In step 212 it is checked whether an abort message has been received since the start time measurement or the reception of the trigger message. When an abort message has been received, step 214 is implemented. When no abort message has been received, step 216 is implemented.
In step 214, in response to the abort message, an acknowledgement message is sent to the monitoring entity 102. The acknowledgement message acknowledges the termination of the network element 104.
Next, step 202 is performed.
In step 216, network element 104 transitions to operation according to the second policy.
Next, step 218 is performed.
In step 218, a configuration confirmation message is sent to the monitoring entity after transitioning to operation according to the second policy. The configuration confirmation message confirms successful transition to operation according to the second policy.
Next, step 202 is performed.
Fig. 3 schematically shows the steps in the monitoring entity 102 according to a first method for operating a communication infrastructure.
In step 302, a trigger signal is sent. Next, step 304 is performed. Optionally, a time measurement is started, which measures the time elapsed since the trigger signal was sent. The trigger signal is transmitted by the monitoring entity 102 in a multicast message, a unicast message or in a broadcast message in operation according to the first policy.
In step 304, reception of at least one reply message is awaited. Optionally, a time measurement is used to wait until a predefined time point after the trigger message is sent.
When a response message is received, or alternatively when a predefined point in time after the trigger message is sent is reached, it is checked in a check by the monitoring entity 102 in step 306 whether at least one response message has been received by the monitoring entity 102, which at least one response message comprises information about whether the second policy is executable. Step 308 is implemented when the second policy is not enforceable by at least one of the plurality of network components 104, or when no reply message has been received from any of the plurality of network components.
Otherwise, step 310 is performed.
In step 308, an abort message is sent by the monitoring entity. In particular, the abort message is sent in a multicast message, in a plurality of unicast messages or in a broadcast message.
Next, step 302 is performed.
In step 310, at least one configuration acknowledgement message, which acknowledges the implementation of the second strategy, is awaited by means of a time measurement until an acknowledgement time point.
When the validation time point is reached, it is checked in step 312 whether the conversion has ended successfully. In this example it is checked whether configuration confirmation messages have been received from all network elements 104. When a successful end of the conversion is recognized, step 314 is implemented. Otherwise, step 316 is performed.
In step 314, the method successfully ends.
In step 316, an abort message is sent.
The abort message is sent when the second policy is not fulfilled by the at least one of the plurality of network elements or when no information is obtained from the at least one of the plurality of network elements about whether the second policy is fulfilled until a predefined confirmation time point after the trigger message is sent.
Optionally, after step 314 or after step 316, step 302 is implemented in order to start a new reconfiguration.
Fig. 4 depicts steps in the network element 104 according to a second method for operating the communication infrastructure 100.
The trigger Signal is in this case represented by a Heartbeat Signal (Heartbeat-Signal) which is received by the network component, in particular periodically or periodically. The transition from operation according to the first strategy to operation according to the second strategy is triggered in the absence of the heartbeat signal or in the event of a change in the heartbeat signal.
In step 402, a heartbeat signal is awaited. When a heartbeat signal is received, it is checked in step 404 that: whether it relates to the first occurrence of a heartbeat signal. If this is the case, step 406 is performed. Otherwise, step 402 is performed.
In step 406, the heartbeat signal is awaited for reoccurrence. When another heartbeat signal occurs, it is checked in step 408 that: whether or not a third occurrence of the first heartbeat signal is involved. If this is the case, step 410 is implemented. Otherwise, step 406 is performed. The absence of the second heartbeat signal is identified when a third heartbeat signal arrives after the first heartbeat signal. This is identified as a trigger signal for the transition. It may also be provided that a second heartbeat signal, which is different from the first heartbeat signal, is transmitted as a trigger signal and this is recognized by the network component 104.
In step 410, operation is switched from operating according to a first strategy as follows to operating according to a second strategy as follows: the first policy is for forwarding time critical data flows in a network component of a communication infrastructure and the second policy is for forwarding time critical data flows in a network component.
Next, row step 412 is performed. In step 412, a configuration confirmation message is sent to the monitoring entity 102.
Next, step 402 is performed.
Fig. 5 shows the steps in the monitoring entity 102 according to a second method for operating the communication infrastructure 100.
In step 502, a time measurement of the heartbeat signal is awaited. When the time for the occurrence of a heartbeat is reached, step 504 is implemented.
In step 504, a heartbeat signal is sent. In this example, the heartbeat signal is constructed such that it is possible to distinguish whether the first, second or third heartbeat is achieved, or whether the second heartbeat does not occur. During operation according to a first strategy, a first heartbeat signal is transmitted by: including all heartbeats. As a trigger for switching from operation according to the first strategy to operation according to the second strategy, a second heartbeat signal, which is different from the first heartbeat signal, or the absence of transmission of the first heartbeat signal, is transmitted.
Next, step 506 is performed.
In step 506, the time measurement for the heartbeat signal is reset. Next, step 502 is performed.

Claims (13)

1. A method for a network component operating in a software defined networked communication infrastructure, wherein the software defined networked communication infrastructure is switched from operating according to a first policy to operating according to a second policy based on at least one trigger signal: the first policy is for forwarding time critical data flows in a network component of the communication infrastructure, the second policy is for forwarding time critical data flows in a network component; wherein in operation according to the first policy, the at least one trigger signal is received (202) from a monitoring entity in a multicast message or in a unicast message or in a broadcast message; wherein the following is checked (204) by the network component in an inspection: whether the second policy is enforced or whether the second policy is enforceable; wherein, depending on the result of the check, in response to a trigger device message, the network component sends (208, 214) a reply message to the monitoring entity, the reply message comprising information on whether the second policy is enforced or whether the second policy is enforceable.
2. A method according to claim 1, characterized in that the operation according to the first strategy is switched (216) to the operation according to the second strategy when no stop message has been received (212) until a predefined switching time point after the trigger message has been received.
3. Method according to claim 2, characterized in that, after receiving the trigger message, up to the predefined transition time point, the following is checked (212): whether an abort message is received; wherein the operation according to the first strategy is maintained when the abort message has been received up to the predefined changeover point in time; and wherein in response to the abort message, an acknowledgement message is sent (214) to the monitoring entity.
4. A method according to claim 1 or 2, characterized in that after the transition to the running according to the second policy, a configuration confirmation message (218) is sent to the monitoring entity.
5. Method according to one of claims 1 to 4, characterized in that the trigger signal is represented by a heartbeat signal received by the network component, in particular periodically or cyclically, wherein a transition from the operation according to the first strategy to the operation according to the second strategy is triggered in the absence of the heartbeat signal or in the event of a change in the heartbeat signal.
6. A method for a monitoring entity operating in a software defined networked communication infrastructure, characterized in that the software defined networked communication infrastructure is switched from operating according to a first policy to operating according to a second policy based on at least one trigger signal: the first policy is for forwarding time critical data flows in a network component of the communication infrastructure, the second policy is for forwarding time critical data flows in a network component; wherein, in operation according to the first strategy, the at least one trigger signal is determined by a monitoring unit and is transmitted (302), in particular in a plurality of unicast messages or in a broadcast message, to a plurality of network components; wherein the monitoring entity verifies that: -in response to the sending of the trigger message, whether a reply message is obtained (306) from at least one of the plurality of network components, the reply message comprising information on whether the second policy is enforceable; and wherein an abort message is transmitted (308) by the monitoring entity, in particular in a plurality of unicast messages or in a broadcast message, when the second policy cannot be carried out by at least one of the plurality of network components or when no information about whether the second policy is practicable is obtained from the at least one of the plurality of network components until a predefined point in time after the trigger message is transmitted.
7. The method according to claim 6, characterized in that, up to a predetermined confirmation time point check (312) after sending the trigger message: whether a configuration confirmation message has been received from at least one network component, the configuration confirmation message confirming that the network component transitioned from the operation according to the first policy to the operation according to the second policy; and wherein the abort message is sent (316), in particular in a plurality of unicast messages or in a broadcast message, when the second policy is not enforced by at least one of the plurality of network components or when no information about whether the second policy is enforced is obtained from at least one of the plurality of network components until the point in time of the acknowledgement.
8. The method of claim 7, wherein verifying: whether a configuration confirmation message is obtained from all of the plurality of network elements, the configuration confirmation message confirming that the second policy is enforced; wherein the abort message is sent when the second policy is not enforced by at least one of the plurality of network elements or when no configuration acknowledgement message is obtained from at least one of the plurality of network elements until the predefined acknowledgement time point after sending the trigger message, which configuration acknowledgement message acknowledges the enforcement of the second policy.
9. Method according to one of claims 6 to 8, characterized in that the trigger signal is represented by a heartbeat signal, in particular periodically or periodically, sent by the monitoring entity, wherein a transition from the operation according to the first strategy to the operation according to the second strategy is triggered by the absence of the heartbeat signal or by a change in the heartbeat signal.
10. A network component (104) in a software defined networked communication infrastructure (100), characterized in that the network component comprises a processor (106), a memory (108) and an interface (110) to the communication infrastructure and that the network component is configured to implement the method according to any of claims 1 to 5.
11. A monitoring entity (102) in a software defined networked communication infrastructure (100), characterized in that the monitoring entity (102) comprises a processor (114), a memory (116) and an interface (112) to the communication infrastructure (100), and that the monitoring entity (102) is configured to implement the method according to any of claims 6 to 9.
12. A computer program comprising computer readable instructions, wherein the instructions, when executed by a computer, perform the method according to any one of claims 1 to 9.
13. A computer program product, characterized in that the computer program product comprises a storage medium on which the computer program according to claim 12 is stored.
CN202010293773.9A 2019-04-16 2020-04-15 Method and apparatus for operating network elements and monitoring entities in a communication infrastructure Active CN111835551B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102019205489.7A DE102019205489A1 (en) 2019-04-16 2019-04-16 Method and device for operating a network component and a control entity in a software-defined networking communication infrastructure
DE102019205489.7 2019-04-16

Publications (2)

Publication Number Publication Date
CN111835551A true CN111835551A (en) 2020-10-27
CN111835551B CN111835551B (en) 2024-04-30

Family

ID=72660521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010293773.9A Active CN111835551B (en) 2019-04-16 2020-04-15 Method and apparatus for operating network elements and monitoring entities in a communication infrastructure

Country Status (3)

Country Link
US (1) US11252086B2 (en)
CN (1) CN111835551B (en)
DE (1) DE102019205489A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389897A (en) * 2022-03-18 2022-04-22 苏州市卫生计生统计信息中心 IT infrastructure security policy centralized management and control optimization method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060074968A1 (en) * 2004-10-06 2006-04-06 Gyetko Gregory E Electronic content distribution management methods and systems
CN104272656A (en) * 2012-05-18 2015-01-07 博科通讯系统有限公司 Network feedback in software-defined networks
US20180013630A1 (en) * 2016-07-11 2018-01-11 Argela Yazilim ve Bilisim Teknolojileri San. ve Tic. A.S. Method for a switch-initiated sdn controller discovery and establishment of an in-band control network
TW201836401A (en) * 2017-03-20 2018-10-01 美商高通公司 Policy communication via control plane signaling

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8963713B2 (en) * 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US9054975B2 (en) * 2010-08-30 2015-06-09 Deutsche Telekom Ag Virtualization and replay-based system for network debugging
WO2018236164A1 (en) * 2017-06-21 2018-12-27 엘지전자(주) Method and device for performing service request procedure in wireless communication system
US10411948B2 (en) * 2017-08-14 2019-09-10 Nicira, Inc. Cooperative active-standby failover between network systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060074968A1 (en) * 2004-10-06 2006-04-06 Gyetko Gregory E Electronic content distribution management methods and systems
CN104272656A (en) * 2012-05-18 2015-01-07 博科通讯系统有限公司 Network feedback in software-defined networks
US20180013630A1 (en) * 2016-07-11 2018-01-11 Argela Yazilim ve Bilisim Teknolojileri San. ve Tic. A.S. Method for a switch-initiated sdn controller discovery and establishment of an in-band control network
TW201836401A (en) * 2017-03-20 2018-10-01 美商高通公司 Policy communication via control plane signaling

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王佳佳;陶小妹;宋梅;宋俊德;: "一种基于策略和NSIS的端到端QoS保障框架设计", 电子测量技术, no. 04 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114389897A (en) * 2022-03-18 2022-04-22 苏州市卫生计生统计信息中心 IT infrastructure security policy centralized management and control optimization method

Also Published As

Publication number Publication date
US20200336419A1 (en) 2020-10-22
CN111835551B (en) 2024-04-30
DE102019205489A1 (en) 2020-10-22
US11252086B2 (en) 2022-02-15

Similar Documents

Publication Publication Date Title
US20210006484A1 (en) Fault detection method, apparatus, and system
CN106817264B (en) Method, device and system for detecting link fault
EP1914939A1 (en) An method for the triggering failure detection of bidirectional forwarding detection
CN109245961B (en) Link quality detection method, device, storage medium and equipment
CN111182659B (en) Mode switching method and mode switching device of Mesh equipment and Mesh equipment
CN109873719B (en) Fault detection method and device
CN107547619B (en) Timer parameter negotiation method and device
WO2014040466A1 (en) Method and device for controlling ap
RYU Project Team RYU SDN Framework-English Edition
WO2017157318A1 (en) Link discovery method and apparatus
EP2614614B1 (en) Dynamic configuration of interconnected devices for measuring performance characteristics in a network
CN111884875A (en) Offline device determination method and device
CN114786241B (en) Network selection method, related device, network equipment and storage medium
CN102711159B (en) The method and system of node is lost based on Zigbee protocol process
US20080267080A1 (en) Fault Verification for an Unpaired Unidirectional Switched-Path
CN111835551A (en) Method and apparatus for operating a network element and a monitoring entity in a communication infrastructure
CN112787843B (en) Method for detecting fault node, storage medium and electronic device
KR100888569B1 (en) Implementing and coordinating configuration of protocols
KR102435334B1 (en) Adaptive Bidirectional Forwarding Detection protocol and equipment for maximizing service availability in network system
US6938086B1 (en) Auto-detection of duplex mismatch on an ethernet
CN110099001B (en) Bidirectional forwarding detection time parameter negotiation method and device and electronic equipment
US8295164B2 (en) Network-connection redundant system for devices with cascade networking capability and method applied on the system
CN116418659A (en) Flexible Ethernet control method and device, storage medium and electronic device
KR101587332B1 (en) Method for checking connectivity between controllers and network apparatuses
CN109951397B (en) Message processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant